Cryptography Reference
In-Depth Information
(a)
(b)
(c)
(d)
(e)
(f)
(g)
FIGURE 7.10
(See color insert.) Results of Step 3 of Algorithm 8 with respect to P m where
Eycrypt cVCRG (P m , m, 3) was based upon Algorithm 4: (a)R m 1 , (b)R m 2 ,
(c)R m 3
; (d)R m 1 R m 2 , (e)R m 1 R m 3 , (f)R m 2 R m 3 ; (g)R m 1 R m 2 R m 3 .
 
 
Search WWH ::




Custom Search